Phishing e-mails from Co-Operative Bank?

Over the last few days, we have seen a large volume of e-mails proclaiming to be from the Co-Operative Bank. They are asking their customers to confirm their banking details for a whole variety of reasons, most recently stating that there is a transfer pending which they are unable to receive until the user confirms their details by clicking on a link within the e-mail message.

To begin with, these e-mails came from a relatively believable address - – but then subsequent e-mails have arrived from - – which is the legitimate domain for the bank.

These emails are 100% fraudulent, they are solely designed to trick the recipient into handing over sensitive banking details.
The fraudsters are then able to gain access to your online banking information.


If you receive one of these emails, do not respond in any way. Just delete the messages.
Banks do not contact their customers for personal account details via e-mail. If in doubt, call the bank to enquire about your account directly.

For a full technical analysis see below;



The initial giveaway that this is a fraudulent e-mail is if you examine the link you are being requested to click on. It claims to take you to the Co-Operative Bank’s website, instead, it takes you to which has been hijacked, but thankfully, as of this morning, displays an error message rather than capturing people’s details.

The e-mail originates from the IP address which is located in New Zealand and I highly doubt therefore authorized to send messages on behalf of the Co-Operative Bank;


inetnum: -

netname:        PLV-TELECOM-NZ

descr:          Telecom New Zealand Ltd

country:        NZ

admin-c:        IA42-AP

tech-c:         IA42-AP


mnt-by:         NZTELECOM

changed: 20090826


source:         APNIC


The most concerning factor of these phishing e-mails is that they claim to be from a legitimate Co-Operative Bank domain. But if we look at the Co-Operative Bank’s sender Policy Framework* (SPF) records then we get the following;

v=spf1 –all

The final section tells the SPF checking to look for SPF records for and include those in the search. However, unfortunately, at this time, this domain has no SPF records. This means the verification of the Co-Operative Bank’s email’s security fails.
This is what has allowed the fraudsters to send these e-mails from their own domain.

What a sobering thought. A high street bank has failed in its duty to protect its customers.
A simple mistake to make, but it comes with serious consequences for its trusting customers.


*Sender Policy Framework (SPF) is a validation system for e-mail. It is able to detect fraudulent e-mails and checks that incoming messages are arriving from a valid domain authorized by that domain’s administrators.